A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

被引:7
|
作者
Tang, Yongli [1 ]
Lian, Huanhuan [1 ]
Zhao, Zemao [2 ]
Yan, Xixi [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Peoples R China
[2] Lishui Univ, Sch Engn, Lishui 323000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 56卷 / 02期
关键词
Cloud computing; keyword search; proxy re-encryption; provable security;
D O I
10.3970/cmc.2018.02965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.
引用
收藏
页码:339 / 352
页数:14
相关论文
共 50 条
  • [21] Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
    Yang, Yang
    Zheng, Xianghan
    Chang, Victor
    Tang, Chunming
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [22] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [23] A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
    Eltayieb, Nabeil
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 293 - 307
  • [24] A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage
    Chen, Zhenhua
    Li, Shundong
    Huang, Qiong
    Wang, Yilei
    Zhou, Sufang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2858 - 2876
  • [25] A cloud data deduplication scheme based on certificateless proxy re-encryption
    Zheng, Xiaoyu
    Zhou, Yuyang
    Ye, Yalan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 102
  • [26] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [27] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [28] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [29] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [30] Proxy Re-encryption Scheme based on the Timed-release in Edge Computing
    Yin Y.
    Zhou W.
    Wang Z.
    Gan Y.
    Zhang Y.
    International Journal of Advanced Computer Science and Applications, 2023, 14 (03) : 347 - 352